Server-Side Request Forgery (SSRF) Affecting batik package, versions <1.12-4+deb11u1
Threat Intelligence
EPSS
1.3% (86th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-BATIK-3062854
- published 26 Oct 2022
- disclosed 25 Oct 2022
Introduced: 25 Oct 2022
CVE-2022-42890 Open this link in a new tabHow to fix?
Upgrade Debian:11 batik to version 1.12-4+deb11u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream batik package and not the batik package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
A vulnerability in Batik of Apache XML Graphics allows an attacker to run Java code from untrusted SVG via JavaScript. This issue affects Apache XML Graphics prior to 1.16. Users are recommended to upgrade to version 1.16.
References
- https://security-tracker.debian.org/tracker/CVE-2022-42890
- https://lists.apache.org/thread/pkvhy0nsj1h1mlon008wtzhosbtxjwly
- http://www.openwall.com/lists/oss-security/2022/10/25/3
- https://lists.debian.org/debian-lts-announce/2022/10/msg00038.html
- https://www.debian.org/security/2022/dsa-5264
- https://security.gentoo.org/glsa/202401-11
CVSS Scores
version 3.1